IT
TagComputer security is broken from top to bottom
Annoyed by the parlous state of computer security, he had, he claimed, decided to perform a public service by demonstrating just how easy ..
Leadership in Cybersecurity
Defining the position of the lead security person in an enterprise can be a challenging and sometimes confusing task.
The next-generation operating model for the digital world
Companies need to increase revenues, lower costs, and delight customers. Doing that requires reinventing the operating model.
Adopting an ecosystem view of business technology
To fully benefit from new business technology, CIOs need to adapt their traditional IT functions to the opportunities and challenges of em..